Logo

Introduction to Metadata by Tony Gill, at al.

Large book cover: Introduction to Metadata

Introduction to Metadata
by

Publisher: Getty Publications
ISBN/ASIN: 0892368969

Description:
Metadata, literally "data about data", provides a means of indexing, accessing, preserving, and discovering digital resources. This book provides an overview of metadata -- its types, roles, and characteristics; a discussion of metadata as it relates to resources on the Web; a description of methods, tools, standards, and protocols that can be used to publish and disseminate digital collections; and a handy glossary.

Home page url

Download or read it online for free here:
Download link
(multiple PDF files)

Similar books

Book cover: Theory and Applications for Advanced Text MiningTheory and Applications for Advanced Text Mining
by - InTech
Text mining techniques are studied aggressively in order to extract the knowledge from the data. This book introduces advanced text mining techniques. They are various techniques from relation extraction to under or less resourced language.
(15658 views)
Book cover: Database Design - 2nd EditionDatabase Design - 2nd Edition
by - BCcampus
The purpose of this text is to provide an open source textbook that covers most introductory database courses. This edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, and exercises.
(7475 views)
Book cover: Elements of Relational Database TheoryElements of Relational Database Theory
by - Brown University Providence
The goal of this paper is to provide a systematic and unifying introduction to relational database theory, including some of the recent developments in database logic programming. The exposition closes with the problems of complex objects...
(9213 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21307 views)